Sciweavers

1486 search results - page 224 / 298
» Algorithms for two-box covering
Sort
View
AVI
2008
15 years 5 months ago
Visualizing program similarity in the Ac plagiarism detection system
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...
Manuel Freire
CCCG
2009
15 years 5 months ago
Enumeration of Polyominoes for p4 Tiling
Polyominoes are the two dimensional shapes made by connecting n unit squares, joined along their edges. In this paper, we propose algorithms to enumerate polyominoes for p4 tiling...
Takashi Horiyama, Masato Samejima
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
15 years 5 months ago
Adapted Pittsburgh classifier system: building accurate strategies in non markovian environments
This paper focuses on the study of the behavior of a genetic algorithm based classifier system, the Adapted Pittsburgh Classifier System (A.P.C.S), on maze type environments con...
Gilles Énée, Mathias Péroumal...
ICAISC
2010
Springer
15 years 4 months ago
Pruning Classification Rules with Reference Vector Selection Methods
Attempts to extract logical rules from data often lead to large sets of classification rules that need to be pruned. Training two classifiers, the C4.5 decision tree and the Non-Ne...
Karol Grudzinski, Marek Grochowski, Wlodzislaw Duc...
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 4 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin